MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0333182e0308aa055e926b1a7aafed8be4de7a8a4ed800aafbb24f8d9ae23547. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RaccoonStealer
Vendor detections: 12
| SHA256 hash: | 0333182e0308aa055e926b1a7aafed8be4de7a8a4ed800aafbb24f8d9ae23547 |
|---|---|
| SHA3-384 hash: | 05b1038c8d3e427b37f05518ceb427897795014223b9b2897e9dba1e2ae23e92a8f1e1c4f294eee79f67e7958006b36a |
| SHA1 hash: | b9e298c443db8c1e5a17eca60e5c4d2ef7bdd519 |
| MD5 hash: | daabb579fc48612e8c836cb82d3aa2b0 |
| humanhash: | ohio-autumn-winner-maine |
| File name: | daabb579fc48612e8c836cb82d3aa2b0 |
| Download: | download sample |
| Signature | RaccoonStealer |
| File size: | 558'592 bytes |
| First seen: | 2021-10-03 19:39:52 UTC |
| Last seen: | 2021-10-03 20:52:04 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d33805713bf84c5172011e6ee58dcc60 (6 x RedLineStealer, 2 x ArkeiStealer, 2 x RaccoonStealer) |
| ssdeep | 12288:zLeNjTmiUjvIHfjRt0khCt7E7GWtFAZvE9GxcaUpsizxp6L:z6nmiUjvIFVCSHAZvBcaK36L |
| Threatray | 3'429 similar samples on MalwareBazaar |
| TLSH | T161C4F10D35A0D7F1E6B656B16722C7F80A7EBC5C482A528F3B88275D7E383D19729306 |
| File icon (PE): | |
| dhash icon | fcfcf4f4d4dcd8c0 (26 x RaccoonStealer, 11 x RedLineStealer, 9 x Stop) |
| Reporter | |
| Tags: | 32 exe RaccoonStealer |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
fcd4fec8c6c38b2ddcf5d018d8ae08a80a495477f2618b825d70820354fcbfd1
e55b2c5d2e4903c916a6b6982b7f0030ad4a4a3e0c1d3f8969e6646dafbb3c35
354efc97e4a680e6b6fceb03d31ead926205efda8d5e0f28abe1c3381aa1991a
ad7a43d349196fcd55f26cafda2ed1907288aff6200e0348718cdc94373d84b9
9fbc2a32b58c53043d6697e93642837cd2b6ab5571794149736741a4ed208a9f
7cd0e04ae6cb26444707130e0d56860e56345c9a2153078621eb7bd511ed1f29
f45b444b6e8d66dc8d97e8ec397a4ffbf1545bef57d783ec906d2c7695b25ac5
1e89e268686b120ae6e58ebfc87c5a532d227a54c35bc3b01ed1b992503f64e2
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | win_raccoon_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.raccoon. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://193.142.59.150/forum/images/hofile.exe